On the Application of Biometric Techniques for Locating Damaged Artworks
|
|
- Amos Moody
- 6 years ago
- Views:
Transcription
1 On the Application of Biometric Techniques for Locating Damaged Artworks Andreas Lanitis (1), Nicolas Tsapatsoulis (2), Anastasios Maronidis (1) (1) Visual Media Computing Lab, Dept. of Multimedia and Graphic Arts Cyprus University of Technology {andreas.lanitis, (2) Dept. of Communication and Internet Studies Cyprus University of Technology Keywords. Biometrics, Forensics, Looted Damaged Art, Icon Restoration, Icon Identification. Abstract. The continuously increasing art market activity and international art transactions lead the market for stolen and fraudulent art to extreme levels. According to US officials, art crime is the third-highest grossing criminal enterprise worldwide. As a result, art forensics is a rising research field dealing with the identification of stolen or looted art and their collection and repatriation. Photographs of artwork provide, in several cases, the only way to locate stolen and looted items. However, it is quite common these items to be damaged as a result of excavation and illegal movement. Digital processing of photographs of damaged artwork is, therefore of high importance in art forensics. This processing emphasizes on object restoration and although techniques from the field of image restoration can be applied it is of high importance to take into account the semantics of the artwork scene and especially the structure of objects appeared therein. In this paper, we assess the application of face image restoration techniques, applied on damaged faces appearing in Byzantine icons, in an attempt to identify the actual icons. Several biometric measurements and facial features along with a set of rules related to the design of Byzantine faces are utilized for this purpose. Preliminary investigation, applied on 25 icons, shows promising results. 1 Introduction Looted art has been a consequence of looting during war, natural disaster and riot for centuries. Looting of art, archaeology and other cultural property may be an opportunistic criminal act or may be a more organized case of unlawful or unethical pillage by the victor of a conflict [2]. As the demand for artifacts increases, criminal groups respond promptly with an unfailing supply of illegally obtained or excavated objects by plundering cultural sites, destroying their context and significance [5]. Renfrew [19] noted: the single largest source of destruction of the archaeological
2 heritage today is through looting the illicit, unrecorded and unpublished excavation to provide antiquities for commercial profit. According to FBI and UNESCO records, looting and trade of antiquities has grown into a multi-billion dollar industry and constitutes the third most profitable illegal traffic after narcotics and arms [5]. As a result, art forensics is a rising research field dealing with the identification of stolen or looted art and their collection and repatriation. Art crime lawyers, forensic experts, computer scientists, and other major players working on legal, forensic, governmental, and political join their efforts to address the enormity of this phenomenon. Insufficient standardized procedures, the lack of reliable data and the pressing need for improvement of methods employed in forensic practice, have been recognized by the National Academic of Sciences with the publication in 2009 of a scientific report stating: It is clear that change and advancements, both systematic and scientific, are needed in a number of forensic disciplines to ensure the reliability of work, establish enforceable standards, and promote best practices with consistent application [17]. This is also true in the case of looting and illicit trade of antiquities. As the origin of looted artifacts is primarily unknown, typological and stylistic studies do not always provide strong support in criminal justice cases for the artifacts attribution and repatriation. Scientific investigations of incidents involving stolen or looted art pose many technological difficulties. Methods providing proof beyond reasonable doubt are therefore required to help assign the precise location of origin / provenance through: chemical composition analyses; isotopic fingerprinting; or through other types of analysis that can identify diagnostic markers for an accurate attribution. This paper deals with a very early stage of art forensics, that of locating artwork which might be stolen or looted, with the aid of simple digital photographs. Since stolen or looted artwork is in many cases damaged (i.e., cutting a larger artwork into small pieces for easy carrying) digital processing of artwork photographs is necessary. This processing is in some cases similar to the classical image restoration. However, the aim here is to digitally restore the objects that appear in the artwork scene. Therefore, it is important to take into account the semantics of the artwork scene and especially the structure of objects appeared therein. In this paper, we assess the application of face image restoration techniques, applied on damaged faces appearing in Byzantine icons, in an attempt to identify the actual icons. Several biometric measurements and facial features along with a set of rules related to the design of Byzantine faces are utilized for this purpose. In the remainder of the paper we present a brief literature review followed by the description of the case study considered in this paper. In Section 4 we describe the experimental set up and present results. Conclusions and plans for future work are presented in Section 5. 2
3 2 Literature Review The art forensics is a new research field. Application of image processing techniques in this field is limited. However, there is a quite extensive literature concerning applications of digital image processing in cultural heritage. This paper borrows several ideas from these techniques and especially from the area of digital restoration of artwork. A variety of digital image processing techniques have been used in cultural heritage applications for guiding the actual restoration process (e.g. cleaning dirty paintings) or for providing virtual restoration. Morphological techniques and Radial Basis Function (RBF) Neural Networks (NN) have been utilized for crack detection, while order statistics and anisotropic diffusion have been used for crack filling in paintings [11, 20]. In a similar perspective, a methodology based on the Retinex theory of human vision for chromatic restoration of paintings has been proposed by Drago & Chiba [10]. Watermarking techniques have also been applied for protecting the digital reproduction of artworks as well as for simulating the actual restoration process [9]. A from local to whole approach methodology to remove cracks from old paintings and frescoes is presented in [3]. The Byzantine icon restoration methodology adopted in this paper combines established statistical methods for occlusion detection and texture restoration on human faces. For instance, in [24], the eyeglasses of a face are removed by learning the joint distribution between pairs of face images with and without eyeglasses from a database. Moreover, in [12, 18, 23] methods for facial occlusion based on recursive PCA reconstruction are described. The occluded regions are restored by iteratively processing the difference between the PCA-reconstructed and the original image. 3 Case Study 3.1 Byzantine Icons Byzantine art refers to the artistic style associated with Byzantine Empire. A large number of Byzantine icons and frescoes showing different Saints, dating back to the 15th century, can be found in churches and monasteries mainly in Eastern Europe. Like numerous other forms of artwork, a number of Byzantine icons of archeological value have been stolen and traded illegally [8]. Especially in the case of frescoes the process of extracting artworks from walls usually causes damages on the original artifacts. Similarly in the case of stolen icons the illegal transportation coupled with non-careful handling, often inflicts damages. 3.2 Byzantine Icon Restoration In [13, 16] an integrated methodology that can be used for detecting and restoring
4 damages on digitized Byzantine icons is described. The icon restoration method was influenced by the work of professional Byzantine icon conservators. It relies on the use of rules that describe the geometric and chromatic structure of faces appearing in Byzantine icons [22]. The restoration framework was also influenced by previous research efforts in the area of biometrics and in particular in the area of detecting and eliminating occlusions on human face images [12, 18, 24]. However, because faces in Byzantine icons are governed by unique geometrical and chromatic rules, face image processing algorithms were customized for dealing with the unique case of Byzantine style. The final application consists of several modules that include landmark annotation, shape restoration, damage detection and texture restoration. Given a damaged face appearing in a Byzantine icon, its shape, as this is defined by a set of 68 landmarks, is recovered through a 3D reconstruction process [4], using a Byzantine specific shape model that has been trained by imposing a set of Byzantine geometric rules on a generic human face model [13]. Detection of damaged areas on the shape-restored face involves the estimation of the residuals obtained after the coding and reconstruction of the face image regions using trained Principal Component Analysis (PCA) texture models. Extracted residuals can be used as the basis for obtaining information about the amount of damage and the positions of damaged regions [15]. The texture of damage-detected regions is, then, restored by utilizing the Recursive PCA algorithm. This is an iterative scheme based on data-driven statistical information [18]. Given a dataset consisting of non-damaged Byzantine faces, a texture model is trained. Changing the parameters of the model results in several synthetic face instances. In a partially damaged face image, the occluded regions are firstly located using the aforementioned automatic occlusion detection method and replaced by the corresponding regions of the nearest face, in terms of intensity distance, from the dataset. The resulting face is coded in model parameters and back reconstructed in the initial face space. Pixel residuals that correspond to the damaged areas between the initial and the reconstructed face are calculated. The above code-reconstruction process is repeated until the total residual is minimized. As a result of the restoration process, an overall 3D instance of the restored face is created. The final step of the restoration phase involves the projection of the 3D instance onto the original 2D face, so that the restored model instance overlaps with the damaged face, completing in that way the process of digital restoration. The developed algorithms have been incorporated within an integrated userfriendly software application that can be used for digital restoration of faces appearing in Byzantine icons. The application performs all of the above functionalities, i.e. damage detection, shape restoration and texture restoration. A quantitative experimental process proved the effectiveness of this Byzantine icon restoration framework [1]. 3.3 Identifying Damaged Stolen Icons Assuming that digital records of stolen Byzantine icons are available, we wish to have an automated system that indicates possible matches between a digital icon found in 4
5 different archives (i.e. internet sites) and the stored dataset of digital icons. Towards this end it is sufficient to use standard image similarity metrics that enable the identification of stolen artifacts. However, in the case that a stolen icon appears damaged, either as a result of normal condition degradation or as a result of human actions, the possible identification of such artwork may be inhibited. For example, Figures 1 and 2 show images of icons that were deliberately corrupted with damages and/or noise. The key question is whether it is still possible to obtain positive identifications between the distorted and original icons, despite the appearance transformations caused by damages and noise. Towards this end we propose to use the Byzantine icon restoration method described in section 3.2, in an attempt to minimize the effects of damages assisting in that way the positive identification of stolen icons. Figure 1 shows, also, examples of digitally restored images (right column), when the restoration method is applied to damaged images (Figure 1, center column). The question that arises concerns the possibility of improving the chances of locating stolen artwork based on the restored versions of the icons rather than utilizing damaged icons. 4 Experimental Evaluation A preliminary investigation that aims to assess the viability of using icon restoration for enhancing the chances of locating stolen icons is described in the following section. In our approach we only utilize data from the facial region because faces constitute a central part of Byzantine icons and as a result in digitized versions of (possibly stolen) icons the facial region is always shown, unlike other parts of an icon, such as labels, that may not be shown in order to impede the icon identification. 4.1 Experimental Set Up During the preliminary investigation 25 Byzantine icons were used. On each of the 25 icons, parts of the face were artificially damaged. For each face a set of 68 landmarks is located in order to enable the accurate derivation of facial features of the face shown in the image. Further to artificial damages imposed on the icons in the test set, noise, of three different types and increasing intensity, was also added. In particular the images were blurred using a Gaussian filter with standard deviations ranging from 0 to 50, salt and pepper noise covering 0% to 50% of the image and the correct positions of the landmarks were displaced by a random amount of 0 up to ±10 pixels. It should be noted that the displacement of the landmarks, although it does not affect the image itself, it affects the overall process of feature extraction. Furthermore in real applications it is expected to encounter non-accurate landmark localization, hence it is crucial to assess the effects of shape-displacement on the identification process. Examples of damaged and noise corrupted icons used in the experiments are shown in Figures 1 and 2. The feasibility of using restored icons was assessed through two main experiments.
6 Experiment 1: This experiment involves the comparison of the difference between image features derived from the original and damaged icons against the difference of image features between the original and restored icons. Experiment 2: In this experiment image features derived from either damaged or restored icons are used for identifying the actual icon against the original set of 25 icons used in the experiment. For the classification experiment a closest distance classifier was used because the primarily aim of this experiment was to assess the goodness of different features rather than the classifier itself. In addition the relatively small number of samples involved in this pilot study does not allow the training of more statistically rigorous classifiers. Fig. 1. Examples of original (left), artificially damaged (center) and restored icons (right) 4.2 Image Features For the two experiments described in section 4.1 six different types of features were used as the means of assessing the image similarity and/or identifying the damaged icon. The actual features used are: Shape Free Texture (SFT): The textures from the internal facial region are warped to a common shape and the intensities within the shape-normalized facial region are used as the feature vector. Active Shape Model (AAM) Parameters: The facial region is coded into a number of Active Appearance Model [6] parameters, using an AAM trained on 100 training Byzantine faces. AAM parameters describe in a compact way both the texture of a face and its facial shape as described by a set of 68 landmarks. Local Binary Patterns (LBP): The shape normalized internal facial region from an icon is divided into 33 patches and from each patch the LBP [1] is estimated. By concatenating the individual LBP vectors an overall feature vector is created. 6
7 Histogram of Oriented Gradients (MHOG): A bounding box of the facial area is divided in four windows (2x2) and a 36-dimension Histogram of Oriented Gradients [7] feature is computed in each window leading to a 144x1 vector representation (by concatenating the HOGs in the four windows). Local Histograms of Oriented Gradients (PHOG): Histogram of Oriented Gradients [7] derived at windows located on 68 key points of each face under consideration. These features highlight the local texture intensity fluctuations at the selected key points. Spatial Histogram of Key-points (SHIK): Based on an 8x8 fractal grid and SIFT [14] descriptors of 128 elements, each image is represented by a 64x128 element vector made of the concatenation of the accumulated SIFT descriptors ordered according to the order of fractal points so that the final descriptor does not depend on the number of SIFT key-points detected [21]. Fig. 2. Examples of noise corrupted icons. The top row shows blurred damaged icons (with sd=20), the middle row shows icons corrupted with 20% salt and pepper noise and the bottom row shows damaged icons with points displaced by ±6 pixels (red marks show the initial points and red marks the displaced points) 4.3 Experimental Results Experiment 1 (comparison of the difference between image features derived from the original and damaged icons): Figures 3, 4 and 5 show plots of the mean distance between feature vectors derived from damaged and original icons (blue lines) and the mean distance between feature vectors derived from restored and original icons (pink lines) among all samples in the test set, against the amount of noise added.
8 (a) (b) (c) (c) (d) (e) Fig. 3. From (a) to (f) mean distance for SFT, AAM, LBP, MHOG, PHOG and SHIK features when damaged icons are blurred with a Gaussian filter with sds ranging from 0 to 50. (a) (b) (c) (c) (d) (e) Fig. 4. From (a) to (f) mean distance for SFT, AAM, LBP, MHOG, PHOG and SHIK features when a percentage from 0-50 of damaged icons are corrupted with salt and pepper noise. (a) (b) (c) (c) (d) (e) Fig. 5. From (a) to (f) mean distance for SFT, AAM, LBP, MHOG, PHOG and SHIK features when landmarks on damaged images are displaced by 0-10 pixels. 8
9 In the case of the raw shape-free texture (SFT), AAM and SHIK features and despite the different types and amount of noise added on the damaged icons, the similarity between the restored faces and the original image remains always higher than in the case of the similarity between damaged and original icons. These findings indicate that the restoration process can play an important role in identifying damaged and/or noise corrupted icons. In general the performance of methods relying on local information (i.e. LPB, PHOG) is not as high as the introduction of noise effects distorts the local structure. Experiment 2 (icon identification based on a damaged or restored icon): Tables 1, 2 and 3 show the correct classification rates when features derived from damaged and restored icons, against the amount of noise added. According to the results, AAM features seem to be the most suitable for identifying damaged icons as in the case of using AAM-based features in most cases a 100% identification rate is achieved despite the corruption of the image with damages and noise. The only case that identification based on AAM s featured falls below 100% is the case involving increased shape displacement. Even in these cases classification based on the restored faces yields better results than classification based on the actual damaged icons. Although the classification performance of features relying on local structures (i.e. SHIK features) is worse than global features (i.e. AAM) under certain circumstances local features could be combined with global features in order to achieve improved overall performance. Table 1. Correct identification rates for ifferent features when damaged icons are blurred with a Gaussian filter with varying sds. SFT AAM LBP MHOG PHOG SHIK sd Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored
10 Table 2. Correct identification rates for ifferent features when a percentage from 0-50 of damaged icons are corrupted with salt and pepper noise. SFT AAM LBP MHOG PHOG SHIK Noise level 0% 5% 10% 20% 30% 50% Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored Table 3. Correct identification rates for ifferent features when landmarks on damaged images are displaced by 0-10 pixels SFT AAM LBP MHOG PHOG SHIK Displacement ±0 ±2 ±4 ±6 ±8 ±10 Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored Damaged Restored Conclusions A pilot study that aims to assess the feasibility of using digitally restored icons in an attempt to identify damaged icons with respect with a dataset of original icons. Within this context, damaged icons undergo a restoration process that aims to predict 10
11 the appearance of the missing parts, based on the appearance of the visible parts and a set of rules related to the design of Byzantine faces, incorporated in the restoration system. Preliminary results indicate that the use of the restored instead of the damaged icon, results in reduced differences in different feature spaces, enhancing in that way the chances of positive identifications of the icons involved. In the actual identification experiments for most features a noticeable improvement in identification performance is observed when utilizing digitally restored icons. Apart form few cases involving increased displacement of facial landmarks, AAM features achieve perfect identification performance using either damaged or restored faces. However, it is envisaged that the improved image similarity between a damaged icon and the original icon, observed when using AAM parameters extracted from a restored rather than a damaged icon will lead to improved identification performance when dealing with test sets containing large numbers of icons. IN the future we plan to stage extended experiments that will involve a large number of icons, in order to verify the early findings across a large number of test samples. In the future we also plan to investigate the use of other feature types and metrics that could potentially be used to offer enhanced identification performance between the restored icons and the original. We expect that our preliminary work and findings in this area will be expanded to cater for different types of artworks so that the efforts of preventing stealing, looting and trafficking of artworks are enhanced. 6 References [1] Ahonen, T., Hadid, A., & Pietikainen, M Face description with local binary patterns: Application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(12), [2] Atwood, R Stealing History, Tomb Raiders, Smugglers and the Looting of the Ancient World. St. Martin s Griffin, New York. [3] Barni M., Bartolini F., Cappellini V Image processing for virtual restoration of artworks. IEEE Multimedia, 7, [4] Blanz V., Vetter T Face recognition based on fitting 3D morphable model. IEEE Transactions on Pattern Analysis and Machine Intelligence 25, [5] Bowman B. A Transnational Crimes Against Culture: Looting at Archaeological Sites and the ''Grey'' Market in Antiquities. Journal of Contemporary Criminal Justice, 24(3), [6] Cootes T.F, Edwards G.J, Taylor C.J Active Appearance Models. IEEE Transactions on Pattern Analysis and Machine Intelligence, 23(6), [7] Dalal, N., Triggs, B Histograms of Oriented Gradients for Human Detection. Proc. of the 2005 IEEE Conference on Computer Vision and Pattern Recognition, pp [8] Hadjisavvas, S The Destruction of the Archaeological Heritage of Cyprus. Trade in Illicit Antiquities: The Destruction of the World's Archaeological Heritage,
12 [9] Del Mastio A., Cappellini V., Caldelli R., De Rosa A., Piva A Virtual restoration and protection of cultural heritage images. 15th International Conference on Digital signal Processing, pp [10] Drago F., Chiba N Locally adaptive chromatic restoration of digitally acquired paintings. International Journal of Image and Graphics, 5, [11] Giakoumis I., Nikolaidis N., Pitas I Digital image processing techniques for the detection and removal of cracks in digitized paintings. IEEE Transactions on Image Processing, 15, [12] Lanitis A Person Identification From Heavily Occluded Face Images. Procs. of the ACM Symposium of Applied Computing, vol 1, pp 5-9. [13] Lanitis A., Stylianou G., Voutounos C Virtual restoration of faces appearing in Byzantine icons. International Journal of Cultural Heritage, Elsevier. [14] Lowe D. G., Distinctive image features from scale invariant keypoints. International Journal of Computer Vision, vol. 60, no. 2, pp [15] Maronidis A. and Lanitis A An Automated Methodology for Assessing the Damage on Byzantine Icons. M. Ioannides et al. (Eds.): International Conference on Cultural Heritage EuroMed 2012, LNCS 7616, pp [16] Maronidis A., Voutounos C., Lanitis A An integrated tool for virtual restoration of Byzantine icons. Proceedings of the 4th International Conference on Information, Intelligence, Systems and Applications. [17] National Academy of Sciences Strengthening Forensic Science in the United States: A Path Forward. Doc. No , Washington, D.C. [18] Park J.S., Oh Y., Ahn S., Lee S.W Glasses removal from facial image using recursive PCA reconstruction. Lecture Notes in Computer Science (LNCS), 2688, [19] Renfrew, C Loot, legitimacy and ownership: the ethical crisis in archaeology. Duckworth, London. [20] Spagnolo G.S, Somma F Virtual restoration of cracks in digitized image of paintings. Journal of Physics Conference Series, 249 (1). [21] Theodosiou, Z. Tsapatsoulis, N. 2013, Spatial Histogram of Keypoints. Proc. of the 20th IEEE Intl. Conference on Image Processing, pp [22] Vranos I.C H Techniki tis Agiographias. P. S. Pournaras (In Greek), Thessaloniki. [23] Wang Z.M., Tao J.H Reconstruction of partially occluded face by fast recursive PCA. International conference on computational intelligence and security workshops, Harbin, December [24] Wu C., Liu C., Shum H.Y., Xy Y.Q., Zhang Z Automatic eyeglasses removal from face images, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26,
Sketch Matching for Crime Investigation using LFDA Framework
International Journal of Engineering and Technical Research (IJETR) Sketch Matching for Crime Investigation using LFDA Framework Anjali J. Pansare, Dr.V.C.Kotak, Babychen K. Mathew Abstract Here we are
More informationImage Extraction using Image Mining Technique
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Illumination Invariant Face Recognition Sailee Salkar 1, Kailash Sharma 2, Nikhil
More informationFace Recognition Based Attendance System with Student Monitoring Using RFID Technology
Face Recognition Based Attendance System with Student Monitoring Using RFID Technology Abhishek N1, Mamatha B R2, Ranjitha M3, Shilpa Bai B4 1,2,3,4 Dept of ECE, SJBIT, Bangalore, Karnataka, India Abstract:
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationMulti-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments
, pp.32-36 http://dx.doi.org/10.14257/astl.2016.129.07 Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments Viet Dung Do 1 and Dong-Min Woo 1 1 Department of
More informationImproved SIFT Matching for Image Pairs with a Scale Difference
Improved SIFT Matching for Image Pairs with a Scale Difference Y. Bastanlar, A. Temizel and Y. Yardımcı Informatics Institute, Middle East Technical University, Ankara, 06531, Turkey Published in IET Electronics,
More informationA Spatial Mean and Median Filter For Noise Removal in Digital Images
A Spatial Mean and Median Filter For Noise Removal in Digital Images N.Rajesh Kumar 1, J.Uday Kumar 2 Associate Professor, Dept. of ECE, Jaya Prakash Narayan College of Engineering, Mahabubnagar, Telangana,
More informationContent Based Image Retrieval Using Color Histogram
Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,
More informationA Comparison of Histogram and Template Matching for Face Verification
A Comparison of and Template Matching for Face Verification Chidambaram Chidambaram Universidade do Estado de Santa Catarina chidambaram@udesc.br Marlon Subtil Marçal, Leyza Baldo Dorini, Hugo Vieira Neto
More informationA NOVEL ARCHITECTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM DETECTED FACE
A NOVEL ARCHITECTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM DETECTED FACE Vibekananda Dutta Dr.Nishtha Kesswani Deepti Gahalot Central University of Rajasthan Central University of Rajasthan Govt.Engineering
More informationStudent Attendance Monitoring System Via Face Detection and Recognition System
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal
More informationSCIENCE & TECHNOLOGY
Pertanika J. Sci. & Technol. 25 (S): 163-172 (2017) SCIENCE & TECHNOLOGY Journal homepage: http://www.pertanika.upm.edu.my/ Performance Comparison of Min-Max Normalisation on Frontal Face Detection Using
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationIntegrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence
Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Sheng Yan LI, Jie FENG, Bin Gang XU, and Xiao Ming TAO Institute of Textiles and Clothing,
More informationLinear Gaussian Method to Detect Blurry Digital Images using SIFT
IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org
More informationMulti-modal Human-computer Interaction
Multi-modal Human-computer Interaction Attila Fazekas Attila.Fazekas@inf.unideb.hu SSIP 2008, 9 July 2008 Hungary and Debrecen Multi-modal Human-computer Interaction - 2 Debrecen Big Church Multi-modal
More informationFeature Extraction of Human Lip Prints
Journal of Current Computer Science and Technology Vol. 2 Issue 1 [2012] 01-08 Corresponding Author: Samir Kumar Bandyopadhyay, Department of Computer Science, Calcutta University, India. Email: skb1@vsnl.com
More informationPreprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition
Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,
More informationToward an Augmented Reality System for Violin Learning Support
Toward an Augmented Reality System for Violin Learning Support Hiroyuki Shiino, François de Sorbier, and Hideo Saito Graduate School of Science and Technology, Keio University, Yokohama, Japan {shiino,fdesorbi,saito}@hvrl.ics.keio.ac.jp
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationDetection and Removal of Cracks in Digitized Paintings via Digital Image Processing
P P P P IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 9, November 2014. Detection and Removal of Cracks in Digitized Paintings via Digital Image Processing
More informationDemosaicing Algorithm for Color Filter Arrays Based on SVMs
www.ijcsi.org 212 Demosaicing Algorithm for Color Filter Arrays Based on SVMs Xiao-fen JIA, Bai-ting Zhao School of Electrical and Information Engineering, Anhui University of Science & Technology Huainan
More informationEFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION
EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,
More informationExperiments with An Improved Iris Segmentation Algorithm
Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.
More informationChinese civilization has accumulated
Color Restoration and Image Retrieval for Dunhuang Fresco Preservation Xiangyang Li, Dongming Lu, and Yunhe Pan Zhejiang University, China Chinese civilization has accumulated many heritage sites over
More informationThis paper is a postprint of a paper submitted to and accepted for publication in IET Biometrics and is subject to Institution of Engineering and
This paper is a postprint of a paper submitted to and accepted for publication in IET Biometrics and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at
More informationTHE MATERIAL DESCRIPTION AND CLASSIFICATION IN NEPHELE SYSTEM FOR ARTWORK RESTORATION
THE MATERIAL DESCRIPTION AND CLASSIFICATION IN NEPHELE SYSTEM FOR ARTWORK RESTORATION M. Beneš a,, B. Zitová b, J. Hradilová c, D. Hradil d a Dept. of Software Engineering, Faculty of Mathematics and Physics,
More informationMulti-modal Human-Computer Interaction. Attila Fazekas.
Multi-modal Human-Computer Interaction Attila Fazekas Attila.Fazekas@inf.unideb.hu Szeged, 12 July 2007 Hungary and Debrecen Multi-modal Human-Computer Interaction - 2 Debrecen Big Church Multi-modal Human-Computer
More informationDetection of License Plates of Vehicles
13 W. K. I. L Wanniarachchi 1, D. U. J. Sonnadara 2 and M. K. Jayananda 2 1 Faculty of Science and Technology, Uva Wellassa University, Sri Lanka 2 Department of Physics, University of Colombo, Sri Lanka
More informationAn Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP)
, pp.13-22 http://dx.doi.org/10.14257/ijmue.2015.10.8.02 An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP) Anusha Alapati 1 and Dae-Seong Kang 1
More informationAutomatic Crack Detection and Inpainting
Automatic Crack Detection and Inpainting Khyati T. Vaghela Computer Engineering Department B.V.M. Engineering College, V.V.Nagar, Gujarat (India) khyati1583@gmail.com Narendra M. Patel Computer Engineering
More informationLabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System
LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System Muralindran Mariappan, Manimehala Nadarajan, and Karthigayan Muthukaruppan Abstract Face identification and tracking has taken a
More informationResearch on Hand Gesture Recognition Using Convolutional Neural Network
Research on Hand Gesture Recognition Using Convolutional Neural Network Tian Zhaoyang a, Cheng Lee Lung b a Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China E-mail address:
More informationUniversité Laval Face Motion and Time-Lapse Video Database (UL-FMTV)
14 th Quantitative InfraRed Thermography Conference Université Laval Face Motion and Time-Lapse Video Database (UL-FMTV) by Reza Shoja Ghiass*, Hakim Bendada*, Xavier Maldague* *Computer Vision and Systems
More informationLocating the Query Block in a Source Document Image
Locating the Query Block in a Source Document Image Naveena M and G Hemanth Kumar Department of Studies in Computer Science, University of Mysore, Manasagangotri-570006, Mysore, INDIA. Abstract: - In automatic
More informationAn Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression
An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication
More informationVARIOUS METHODS IN DIGITAL IMAGE PROCESSING. S.Selvaragini 1, E.Venkatesan 2. BIST, BIHER,Bharath University, Chennai-73
Volume 116 No. 16 2017, 265-269 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu VARIOUS METHODS IN DIGITAL IMAGE PROCESSING S.Selvaragini 1, E.Venkatesan
More informationCombined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye
More informationBackground. Computer Vision & Digital Image Processing. Improved Bartlane transmitted image. Example Bartlane transmitted image
Background Computer Vision & Digital Image Processing Introduction to Digital Image Processing Interest comes from two primary backgrounds Improvement of pictorial information for human perception How
More informationStamp detection in scanned documents
Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,
More informationBlind Single-Image Super Resolution Reconstruction with Defocus Blur
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Blind Single-Image Super Resolution Reconstruction with Defocus Blur Fengqing Qin, Lihong Zhu, Lilan Cao, Wanan Yang Institute
More informationImage Denoising Using Statistical and Non Statistical Method
Image Denoising Using Statistical and Non Statistical Method Ms. Shefali A. Uplenchwar 1, Mrs. P. J. Suryawanshi 2, Ms. S. G. Mungale 3 1MTech, Dept. of Electronics Engineering, PCE, Maharashtra, India
More informationTampering and Copy-Move Forgery Detection Using Sift Feature
Tampering and Copy-Move Forgery Detection Using Sift Feature N.Anantharaj 1 M-TECH (IT) Final Year, Department of IT, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India 1 ABSTRACT:
More informationAPPENDIX 1 TEXTURE IMAGE DATABASES
167 APPENDIX 1 TEXTURE IMAGE DATABASES A 1.1 BRODATZ DATABASE The Brodatz's photo album is a well-known benchmark database for evaluating texture recognition algorithms. It contains 111 different texture
More informationEvolutionary Learning of Local Descriptor Operators for Object Recognition
Genetic and Evolutionary Computation Conference Montréal, Canada 6th ANNUAL HUMIES AWARDS Evolutionary Learning of Local Descriptor Operators for Object Recognition Present : Cynthia B. Pérez and Gustavo
More informationMultiresolution Analysis of Connectivity
Multiresolution Analysis of Connectivity Atul Sajjanhar 1, Guojun Lu 2, Dengsheng Zhang 2, Tian Qi 3 1 School of Information Technology Deakin University 221 Burwood Highway Burwood, VIC 3125 Australia
More informationRestoration of Motion Blurred Document Images
Restoration of Motion Blurred Document Images Bolan Su 12, Shijian Lu 2 and Tan Chew Lim 1 1 Department of Computer Science,School of Computing,National University of Singapore Computing 1, 13 Computing
More informationReliable Classification of Partially Occluded Coins
Reliable Classification of Partially Occluded Coins e-mail: L.J.P. van der Maaten P.J. Boon MICC, Universiteit Maastricht P.O. Box 616, 6200 MD Maastricht, The Netherlands telephone: (+31)43-3883901 fax:
More informationStudy Impact of Architectural Style and Partial View on Landmark Recognition
Study Impact of Architectural Style and Partial View on Landmark Recognition Ying Chen smileyc@stanford.edu 1. Introduction Landmark recognition in image processing is one of the important object recognition
More informationMultimodal Face Recognition using Hybrid Correlation Filters
Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com
More informationAutomatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 3 (2012), pp. 173-180 International Research Publications House http://www. irphouse.com Automatic Morphological
More informationLicense Plate Localisation based on Morphological Operations
License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract
More informationMultimedia Forensics
Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer
More informationEFFECTS OF SEVERE SIGNAL DEGRADATION ON EAR DETECTION. J. Wagner, A. Pflug, C. Rathgeb and C. Busch
EFFECTS OF SEVERE SIGNAL DEGRADATION ON EAR DETECTION J. Wagner, A. Pflug, C. Rathgeb and C. Busch da/sec Biometrics and Internet Security Research Group Hochschule Darmstadt, Darmstadt, Germany {johannes.wagner,anika.pflug,christian.rathgeb,christoph.busch}@cased.de
More informationAn Adaptive Kernel-Growing Median Filter for High Noise Images. Jacob Laurel. Birmingham, AL, USA. Birmingham, AL, USA
An Adaptive Kernel-Growing Median Filter for High Noise Images Jacob Laurel Department of Electrical and Computer Engineering, University of Alabama at Birmingham, Birmingham, AL, USA Electrical and Computer
More informationDifferentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern
Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern Chisako Muramatsu 1, Min Zhang 1, Takeshi Hara 1, Tokiko Endo 2,3, and Hiroshi Fujita 1 1 Department of Intelligent
More informationA New Scheme for No Reference Image Quality Assessment
Author manuscript, published in "3rd International Conference on Image Processing Theory, Tools and Applications, Istanbul : Turkey (2012)" A New Scheme for No Reference Image Quality Assessment Aladine
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationColor Constancy Using Standard Deviation of Color Channels
2010 International Conference on Pattern Recognition Color Constancy Using Standard Deviation of Color Channels Anustup Choudhury and Gérard Medioni Department of Computer Science University of Southern
More informationLaser Printer Source Forensics for Arbitrary Chinese Characters
Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,
More informationDYNAMIC CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SUPER- RESOLUTION
Journal of Advanced College of Engineering and Management, Vol. 3, 2017 DYNAMIC CONVOLUTIONAL NEURAL NETWORK FOR IMAGE SUPER- RESOLUTION Anil Bhujel 1, Dibakar Raj Pant 2 1 Ministry of Information and
More informationEffects of the Unscented Kalman Filter Process for High Performance Face Detector
Effects of the Unscented Kalman Filter Process for High Performance Face Detector Bikash Lamsal and Naofumi Matsumoto Abstract This paper concerns with a high performance algorithm for human face detection
More informationUrban Feature Classification Technique from RGB Data using Sequential Methods
Urban Feature Classification Technique from RGB Data using Sequential Methods Hassan Elhifnawy Civil Engineering Department Military Technical College Cairo, Egypt Abstract- This research produces a fully
More informationImage Manipulation Detection using Convolutional Neural Network
Image Manipulation Detection using Convolutional Neural Network Dong-Hyun Kim 1 and Hae-Yeoun Lee 2,* 1 Graduate Student, 2 PhD, Professor 1,2 Department of Computer Software Engineering, Kumoh National
More informationCOMP 776 Computer Vision Project Final Report Distinguishing cartoon image and paintings from photographs
COMP 776 Computer Vision Project Final Report Distinguishing cartoon image and paintings from photographs Sang Woo Lee 1. Introduction With overwhelming large scale images on the web, we need to classify
More informationDigital Image Processing
Digital Image Processing 1 Patrick Olomoshola, 2 Taiwo Samuel Afolayan 1,2 Surveying & Geoinformatic Department, Faculty of Environmental Sciences, Rufus Giwa Polytechnic, Owo. Nigeria Abstract: This paper
More informationA Histogram based Algorithm for Denoising Images Corrupted with Impulse Noise
A Histogram based Algorithm for Denoising Images Corrupted with Impulse Noise Jasmeen Kaur Lecturer RBIENT, Hoshiarpur Abstract An algorithm is designed for the histogram representation of an image, subsequent
More informationTHERMAL DETECTION OF WATER SATURATION SPOTS FOR LANDSLIDE PREDICTION
THERMAL DETECTION OF WATER SATURATION SPOTS FOR LANDSLIDE PREDICTION Aufa Zin, Kamarul Hawari and Norliana Khamisan Faculty of Electrical and Electronics Engineering, Universiti Malaysia Pahang, Pekan,
More informationDetecting Resized Double JPEG Compressed Images Using Support Vector Machine
Detecting Resized Double JPEG Compressed Images Using Support Vector Machine Hieu Cuong Nguyen and Stefan Katzenbeisser Computer Science Department, Darmstadt University of Technology, Germany {cuong,katzenbeisser}@seceng.informatik.tu-darmstadt.de
More informationPHOTOGRAPH RETRIEVAL BASED ON FACE SKETCH USING SIFT WITH PCA
ABSTRACT PHOTOGRAPH RETRIEVAL BASED ON FACE SKETCH USING SIFT WITH PCA Tayyaba Hashmi ME Information Technology, Shah & Anchor Kutchhi Engineering College University of Mumbai, (India) The problem of matching
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationCS 365 Project Report Digital Image Forensics. Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee
CS 365 Project Report Digital Image Forensics Abhijit Sharang (10007) Pankaj Jindal (Y9399) Advisor: Prof. Amitabha Mukherjee 1 Abstract Determining the authenticity of an image is now an important area
More informationAn Efficient Noise Removing Technique Using Mdbut Filter in Images
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. II (May - Jun.2015), PP 49-56 www.iosrjournals.org An Efficient Noise
More informationA Proposal for Security Oversight at Automated Teller Machine System
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated
More informationNon-Uniform Motion Blur For Face Recognition
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 08, Issue 6 (June. 2018), V (IV) PP 46-52 www.iosrjen.org Non-Uniform Motion Blur For Face Recognition Durga Bhavani
More informationOBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK
xv Preface Advancement in technology leads to wide spread use of mounting cameras to capture video imagery. Such surveillance cameras are predominant in commercial institutions through recording the cameras
More informationRemoval of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter
Removal of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter K. Santhosh Kumar 1, M. Gopi 2 1 M. Tech Student CVSR College of Engineering, Hyderabad,
More informationCheckerboard Tracker for Camera Calibration. Andrew DeKelaita EE368
Checkerboard Tracker for Camera Calibration Abstract Andrew DeKelaita EE368 The checkerboard extraction process is an important pre-preprocessing step in camera calibration. This project attempts to implement
More informationAn Automatic System for Detecting the Vehicle Registration Plate from Video in Foggy and Rainy Environments using Restoration Technique
An Automatic System for Detecting the Vehicle Registration Plate from Video in Foggy and Rainy Environments using Restoration Technique Savneet Kaur M.tech (CSE) GNDEC LUDHIANA Kamaljit Kaur Dhillon Assistant
More informationMidterm Examination CS 534: Computational Photography
Midterm Examination CS 534: Computational Photography November 3, 2015 NAME: SOLUTIONS Problem Score Max Score 1 8 2 8 3 9 4 4 5 3 6 4 7 6 8 13 9 7 10 4 11 7 12 10 13 9 14 8 Total 100 1 1. [8] What are
More informationFast identification of individuals based on iris characteristics for biometric systems
Fast identification of individuals based on iris characteristics for biometric systems J.G. Rogeri, M.A. Pontes, A.S. Pereira and N. Marranghello Department of Computer Science and Statistic, IBILCE, Sao
More informationBogdan Smolka. Polish-Japanese Institute of Information Technology Koszykowa 86, , Warsaw
appeared in 10. Workshop Farbbildverarbeitung 2004, Koblenz, Online-Proceedings http://www.uni-koblenz.de/icv/fws2004/ Robust Color Image Retrieval for the WWW Bogdan Smolka Polish-Japanese Institute of
More informationCamera Resolution and Distortion: Advanced Edge Fitting
28, Society for Imaging Science and Technology Camera Resolution and Distortion: Advanced Edge Fitting Peter D. Burns; Burns Digital Imaging and Don Williams; Image Science Associates Abstract A frequently
More informationFACE RECOGNITION USING NEURAL NETWORKS
Int. J. Elec&Electr.Eng&Telecoms. 2014 Vinoda Yaragatti and Bhaskar B, 2014 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 3, No. 3, July 2014 2014 IJEETC. All Rights Reserved FACE RECOGNITION USING
More informationOn-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor
On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International
More informationImage Processing for feature extraction
Image Processing for feature extraction 1 Outline Rationale for image pre-processing Gray-scale transformations Geometric transformations Local preprocessing Reading: Sonka et al 5.1, 5.2, 5.3 2 Image
More informationA VIDEO CAMERA ROAD SIGN SYSTEM OF THE EARLY WARNING FROM COLLISION WITH THE WILD ANIMALS
Vol. 12, Issue 1/2016, 42-46 DOI: 10.1515/cee-2016-0006 A VIDEO CAMERA ROAD SIGN SYSTEM OF THE EARLY WARNING FROM COLLISION WITH THE WILD ANIMALS Slavomir MATUSKA 1*, Robert HUDEC 2, Patrik KAMENCAY 3,
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK CLEANING AND SEGMENTATION OF WEB IMAGES USING DENOISING TECHNIQUES VAISHALI S.
More informationClassification in Image processing: A Survey
Classification in Image processing: A Survey Rashmi R V, Sheela Sridhar Department of computer science and Engineering, B.N.M.I.T, Bangalore-560070 Department of computer science and Engineering, B.N.M.I.T,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 4, April 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Approach
More informationPerformance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images
Performance Evaluation of Edge Detection Techniques for Square Pixel and Hexagon Pixel images Keshav Thakur 1, Er Pooja Gupta 2,Dr.Kuldip Pahwa 3, 1,M.Tech Final Year Student, Deptt. of ECE, MMU Ambala,
More informationCROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS. Kuan-Chuan Peng and Tsuhan Chen
CROSS-LAYER FEATURES IN CONVOLUTIONAL NEURAL NETWORKS FOR GENERIC CLASSIFICATION TASKS Kuan-Chuan Peng and Tsuhan Chen Cornell University School of Electrical and Computer Engineering Ithaca, NY 14850
More informationReal Time Word to Picture Translation for Chinese Restaurant Menus
Real Time Word to Picture Translation for Chinese Restaurant Menus Michelle Jin, Ling Xiao Wang, Boyang Zhang Email: mzjin12, lx2wang, boyangz @stanford.edu EE268 Project Report, Spring 2014 Abstract--We
More informationANALYSIS OF PARTIAL IRIS RECOGNITION
ANALYSIS OF PARTIAL IRIS RECOGNITION Yingzi Du, Robert Ives, Bradford Bonney, Delores Etter Electrical Engineering Department, U.S. Naval Academy, Annapolis, MD, USA 21402 ABSTRACT In this paper, we investigate
More informationVideo Synthesis System for Monitoring Closed Sections 1
Video Synthesis System for Monitoring Closed Sections 1 Taehyeong Kim *, 2 Bum-Jin Park 1 Senior Researcher, Korea Institute of Construction Technology, Korea 2 Senior Researcher, Korea Institute of Construction
More informationFace Detection System on Ada boost Algorithm Using Haar Classifiers
Vol.2, Issue.6, Nov-Dec. 2012 pp-3996-4000 ISSN: 2249-6645 Face Detection System on Ada boost Algorithm Using Haar Classifiers M. Gopi Krishna, A. Srinivasulu, Prof (Dr.) T.K.Basak 1, 2 Department of Electronics
More informationSegmentation of Microscopic Bone Images
International Journal of Electronics Engineering, 2(1), 2010, pp. 11-15 Segmentation of Microscopic Bone Images Anand Jatti Research Scholar, Vishveshvaraiah Technological University, Belgaum, Karnataka
More informationFace Recognition System Based on Infrared Image
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 6, Issue 1 [October. 217] PP: 47-56 Face Recognition System Based on Infrared Image Yong Tang School of Electronics
More informationLossless Huffman coding image compression implementation in spatial domain by using advanced enhancement techniques
Lossless Huffman coding image compression implementation in spatial domain by using advanced enhancement techniques Ali Tariq Bhatti 1, Dr. Jung H. Kim 2 1,2 Department of Electrical & Computer engineering
More information